| Source | Azure Portal | ||||||||||||
| Display name | Keys should have more than the specified number of days before expiration | ||||||||||||
| Id | 5ff38825-c5d8-47c5-b70e-069a21955146 | ||||||||||||
| Version | 1.0.1 Details on versioning |
||||||||||||
| Versioning |
Versions supported for Versioning: 1 1.0.1 Built-in Versioning [Preview] |
||||||||||||
| Category | Key Vault Microsoft Learn |
||||||||||||
| Description | If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. | ||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.1' Repository: Azure-Policy 5ff38825-c5d8-47c5-b70e-069a21955146 |
||||||||||||
| Mode | Microsoft.KeyVault.Data | ||||||||||||
| Type | BuiltIn | ||||||||||||
| Preview | False | ||||||||||||
| Deprecated | False | ||||||||||||
| Effect | Default Audit Allowed Audit, Deny, Disabled |
||||||||||||
| RBAC role(s) | none | ||||||||||||
| Rule aliases | none | ||||||||||||
| Rule resource types | none | ||||||||||||
| Compliance | Not a Compliance control | ||||||||||||
| Initiatives usage |
|
||||||||||||
| History |
|
||||||||||||
| JSON compare |
compare mode:
version left:
version right:
|
||||||||||||
| JSON |
|